.:[ packet storm ]:.
                         
paranoia is a friend like no other
paranoia is a friend like no other

 Section:  .. / Last 20 Tool Files /

 ///  File Name:srm-1.2.10.tar.gz
Description:
secure rm (srm) is a command-line compatible rm(1) which completely destroys file contents before unlinking. The goal is to provide drop in security for users who wish to prevent command line recovery of deleted information, even if the machine is compromised.
Author:Matthew Gauthier
Homepage:http://srm.sourceforge.net
Changes:The program now compiles and works on Mac OS X again. A DoE wipe mode was added. Deletion of named pipes/FIFOs was fixed. Debian and Win32 fixes were applied.
File Size:119081
Last Modified:Aug 18 18:10:45 2009
MD5 Checksum:127732632dde102688888c70ede89491

 ///  File Name:hyenae-0.31-1.tar.gz
Description:
Hyenae is a highly flexible and platform independent network packet generator. It allows you to reproduce low level Ethernet attack scenarios (such as MITM, DoS, and DDoS) to reveal potential security vulnerabilities of your network. Besides smart wildcard-based address randomization, a highly customizable packet generation control, and an interactive attack assistant, Hyenae comes with a clusterable remote daemon for setting up distributed attack networks.
Author:Robin Richter
Homepage:http://sourceforge.net/projects/hyenae/
Changes:This release has bugfixes, an improved attack assistant, extended / fixed documentation, a TCP-Land attack in the attack assistant, and an ICMP-Smurf attack in the attack assistant. It changes the daemon max clients argument (from -C to -m).
File Size:142420
Last Modified:Aug 17 14:26:22 2009
MD5 Checksum:5ca31cca7222bfbdf4a4592b7b40e4cd

 ///  File Name:trafscrambler-0.2.tgz
Description:
Trafscrambler is an anti-sniffer/IDS NKE (Network Kernel Extension) for Mac OS X. Author tested this on x86 OS X versions 10.5.6 and 10.5.7. It should work on PPC and older releases as well.
Author:Maxim Bourmistrov
Homepage:http://en.roolz.org/trafscrambler.html
Changes:This release implements fake data injection, userland binary tsctrl to control NKE, minor re-work of NKE.
File Size:8788
Last Modified:Aug 15 16:37:41 2009
MD5 Checksum:2b9fbbb730fe3a425956a9ef93185be4

 ///  File Name:samhain-2.5.8.tar.gz
Description:
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.
Author:Rainer Wichmann
Homepage:http://samhain.sourceforge.net
Changes:This release fixes two bugs in the mailer code: MX resolving would fail sometimes, and a deadlock could occur.
File Size:1052672
Last Modified:Aug 15 14:52:04 2009
MD5 Checksum:4870c9a0fb5fc8faff8b0ec5fe4004de

 ///  File Name:Ipsbuilder.txt
Description:
This script provides an all-in-one easy installation of Snort in a box in bridge mode with a complex configuration.
Author:Augusto Pereyra
Homepage:http://code.google.com/p/ips-builder/downloads/list
File Size:8190
Last Modified:Aug 11 18:43:59 2009
MD5 Checksum:d556a7ef731a9f01143ebecb0ca0ac33

 ///  File Name:sshdautoban-0.75.tar.bz2
Description:
sshdautoban is a script intended to automatically ban, in real time, attackers that are trying to connect on your sshd service without authorization. It blocks connections from an IP address when it issues too many login errors.
Homepage:http://sshdautoban.coredumb.net/
Changes:The fifo was removed, and sockets are used instead. The fifo was too slow and many log lines could be missed. The documentation was updated.
File Size:2935
Last Modified:Aug 10 19:48:51 2009
MD5 Checksum:a7fe4c4724af9becb8cd1dbe3d911c2d

 ///  File Name:xplico-0.5.2.tgz
Description:
Xplico is an open source Network Forensic Analysis Tool (NFAT) that allows for data extraction from traffic captures. It supports extraction of mail from POP, IMAP, and SMTP, can extract VoIP streams, etc. This is the version that has a GUI allowing you to view photos, texts and videos contained in MMS messages.
Author:Andrea de Franceschi,Gianluca Costa
Homepage:http://www.xplico.org/
Changes:This release introduces the IPv6, UDP, PPP, FTP, TFTP, DNS and SLL dissectors.
File Size:234302
Last Modified:Aug 6 00:43:05 2009
MD5 Checksum:e67e26d275089ec1965e6f24baaa7cfd

 ///  File Name:xplico_interface-0.5.2.tgz
Description:
This is the web UI for the Xplico network forensic analysis tool.
Author:Gianluca Costa
Homepage:http://www.xplico.org/
File Size:568050
Last Modified:Aug 6 00:43:05 2009
MD5 Checksum:48719710a3591f0386355c7ef94c354d

 ///  File Name:fiked-0.0.5.tar.bz2
Description:
Fiked is a fake IKE daemon that supports just enough of the standards and Cisco extensions to attack commonly found insecure Cisco PSK+XAUTH VPN setups in what could be described as a semi-MitM attack. Basically, knowing the pre-shared key, also known as shared secret or group password, the VPN gateway can be impersonated in IKE phase 1, in order to learn XAUTH user credentials in phase 2. The configuration supported by fiked is IKE aggressive mode using pre-shared keys and XAUTH. Supported algorithms are DES, 3DES, AES128, AES192, AES256, MD5, SHA1, and DH groups 1, 2, and 5. Main mode is not supported.
Author:Daniel Roethlisberger
Homepage:http://www.roe.ch/FakeIKEd
Changes:This release has some bug fixes.
File Size:109307
Last Modified:Aug 6 00:35:48 2009
MD5 Checksum:2313cf2e13c0d516caea72bf4b57a7e4

 ///  File Name:silc-server-1.1.17.tar.gz
Description:
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all server related files.
Author:priikone
Homepage:http://silcnet.org
Changes:This version fixes an empty channel problem and a number of crashes.
File Size:1171853
Last Modified:Aug 5 15:01:07 2009
MD5 Checksum:ddab919195760ee446cc00d395712500

 ///  File Name:silc-client-1.1.8.tar.gz
Description:
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all client related files.
Author:priikone
Homepage:http://silcnet.org
Changes:This version fixes a serious string format vulnerability.
File Size:2007675
Last Modified:Aug 5 15:01:00 2009
MD5 Checksum:17e631a59eeef33840e5e00043cb87f0

 ///  File Name:haraldscan-0.3.tar.gz
Description:
Harald Scan is a Bluetooth discovery scanner. It determines Major and Minor device classes according to the Bluetooth SIG specification and attempts to resolve a device's MAC address to the largest known vendor/MAC address list. Written in Python.
Author:Terence Stenvold
Homepage:http://code.google.com/p/haraldscan/
Changes:MACLIST now uses IEEE OUI naming for vendors. It also contains 223 entries. The interface now shows how many devices were discovered. The -s and "Unknown" MAC service scans are only done once instead of continually.
File Size:8932
Last Modified:Jul 30 11:43:16 2009
MD5 Checksum:4bb0a34fe5700ba1e7d1e257f91f278b

 ///  File Name:tor-0.2.1.19.tar.gz
Description:
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
Author:Roger Dingledine
Homepage:http://tor.eff.org
Changes:This release makes hidden services work correctly again on 0.2.1.x.
File Size:2409484
Last Modified:Jul 29 15:17:53 2009
MD5 Checksum:2c0ca9bf5d0cfb771f4d6bec9c4360ca

 ///  File Name:afick-2.14-1.tgz
Description:
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
Author:Eric Gerbier
Homepage:http://afick.sourceforge.net/
Changes:The checksum output is now compatible with md5sum/sha1sum commands. A bug was fixed on negative rules. The quiet option was added. The graphical interface now accepts database, history, and archive command line options.
File Size:1043653
Last Modified:Jul 28 11:00:09 2009
MD5 Checksum:74b85916767a45c024a4dc125547f6a2

 ///  File Name:keychain-2.6.9.tar.bz2
Description:
keychain is a utility that helps manage ssh keys in a convenient and secure manner. It acts as a frontend to ssh-agent, but allows the user to easily have one long running ssh-agent process per system, rather than the norm of one ssh-agent per login session. It also makes it easy for remote cron jobs to securely hook-in to a long running ssh-agent process, allowing your scripts to take advantage of key-based logins.
Author:Aron Griffis
Homepage:http://www.gentoo.org/proj/en/keychain.xml
Changes:Mac OS X color fix. Perl 5.10 Makefile fix. A few other improvements.
File Size:46563
Last Modified:Jul 27 22:03:22 2009
MD5 Checksum:797afa3ee7608ef6c6cd90479f023abf

 ///  File Name:hyenae-0.30-1.tar.gz
Description:
Hyenae is a highly flexible and platform independent network packet generator. It allows you to reproduce low level Ethernet attack scenarios (such as MITM, DoS, and DDoS) to reveal potential security vulnerabilities of your network. Besides smart wildcard-based address randomization, a highly customizable packet generation control, and an interactive attack assistant, Hyenae comes with a clusterable remote daemon for setting up distributed attack networks.
Author:Robin Richter
Homepage:http://sourceforge.net/projects/hyenae/
Changes:An attack assistant was added. Minor code refactoring was done. The documentation was updated and fixed. Randomization on ARP attacks was made equal for source and sender HW-Address.
File Size:140475
Last Modified:Jul 27 21:58:30 2009
MD5 Checksum:a94d5801ba639604e1cf658546cb88a9

 ///  File Name:gerix-wifi-cracker-ng-r20.tar.gz
Description:
Gerix Wifi Cracker New Generation - The software that even your grandmother knows how to use!This is a GUI for Aircrack-NG.
Homepage:http://backtrack.it/~emgent/hackstuff/Gerix-Wifi-Cracker-NG/index-en.html
File Size:264162
Last Modified:Jul 27 21:35:19 2009
MD5 Checksum:6a30fbeb92c76ca71e96b8b4206b3705

 ///  File Name:sqlmap-0.7.tar.gz
Description:
sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.
Author:Bernardo Damele
Homepage:http://sqlmap.sourceforge.net
Changes:Adapted Metasploit wrapping functions to work with latest 3.3 development version too. Adjusted code to make sqlmap 0.7 to work again on Mac OSX too. Various other tweaks and improvements.
File Size:1887120
Last Modified:Jul 27 21:10:34 2009
MD5 Checksum:edb1a625fb18b0b8aae2fc15a66a055e

 ///  File Name:pidgin_bot.tar.gz
Description:
This is a pidgin bot plugin that allows for remote command execution.
Author:WarGame
File Size:144438
Last Modified:Jul 24 21:53:15 2009
MD5 Checksum:979bb12fbcf288816b28fc7b2635bbeb

 ///  File Name:Botan-1.8.5.tgz
Description:
Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference.
Homepage:http://botan.randombit.net/
Changes:This release fixes build problems affecting SPARC, HP-PA, and ARM processors. The Python configure script now supports stock CPython 2.4. A bug causing Skein-512 to crash if given a zero-length input vector was fixed.
File Size:3444972
Last Modified:Jul 23 18:19:46 2009
MD5 Checksum:26d5d7488bacd12a3779cb3750692399